password change: minimum password age: maximum password age: password warning period: password inactivity period: account expiration date: reserved field
The data is separated by ":" or "$ ".
Commands related to user and group management:
Useradd, usermod, passwd, userdel
Groupadd, groupmod, gpasswd, groupdel
Chage, chsh, chfn
Id, w, who, whoami
Su
Useradd: create a user
Useradd [options] LOGIN
Useradd-D [options]
-R: Create a system user
-U UID: in
permissions.8. Test RunNow, mpich2 can be put into operation. Run the following command to test it:MPD # Start the daemon of mpich2Mpiexec-N 6 whoami # Run six whoami in parallelMpdallexit # disable daemon of mpich2Todos:Some problems still need to be solved when compiling with Solaris cc; more cases are needed for testing.Refer:Mpich2 Installer's Guide
Work Platform: SunOS 5.11 snv_50 i86pc i386 i86pc
management commands
[Su] switch to another user
[Useradd] append a user
[Adduser] append user
[Userdel] deleting a user
[Usermod] modifying user settings
[Chfn] modifying user private information
[Groupadd] append Group
[Groupdel] deleting a group
[Groupmod] modify group settings
[Passwd] Change Password
[Whoami] Display User Name
[LOGNAME] displays the logon User Account
[Users] displays information about all logon users
[Who] query login user infor
Whois
Function Description: search for and display user information.Method: whois [Account name]Note: The whois command will search for and display the user information of the specified account, because it is found in the WHOIS database of network solutions, so the account name must be registered above for retrieval, the name is case-insensitive.---------------------------------------------------------Whoami
Function Description: The user name is disp
format (default setting) Note: For example: % w4.2 shows who logged on to the machine command: who format: Who function: Display All usernames in the system currently, using the terminal device number, registration time. For example, % who4.3 shows the user name command on the current terminal: whoami format: whoami function: displays the user on the current terminal. For example: % whoami4.4 determine the
use Ghost to install the system or to do experiments with the virtual machine clone. Also, when you install VMware View server, you verify that the SID of both machines is the sameNow that we know the importance of SID for computers, how do we look at the SID of a machine?In fact, it is very simple, we can only use one command. At the command prompt interface, enter Whoami/user. We can see that the SID of this machine is s-1-5-***-79435-500, if we u
. The default value is 514.-X disables DNS lookup when receiving client messages. It must be used with the-r parameter.-M indicates the timestamp. The Unit is minute. If it is 0, this function is disabled.
After the configuration file is modified, restart the rsyslog service.
Client:
Vi/etc/rsyslog. conf *. * @ 172.16.2.240 # Add and change the line. @ is followed by the server IP address. Vi/etc/bashrc # optional, which records: Who runs the exportPROMPT_COMMAND = '{msg =$ (history1 | {readxy;
will give you a great output about every system call of this program. These system calls may be added to your hacking LKM. I don't have such a hypervisor as an example. But let's look at the output of 'strace whoam:
Execve ("/usr/bin/whoami", ["whoami"], [/* 50 vars */]) = 0
Mmap (0, 4096, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS,-1, 0) =
Zero x 40007000
Mprotect (0x40000000,206 73,
Finger Command Query User informationOption parameters:-S: Lists only the user's account number, full name, terminal code and login time, etc.;-M: List the same person as the account followed, not the partial match (including the full name part)View user Information # finger lyjlogin:lyj /home/lyj Shell:/bin/bashnever Lin. No Mail. No Plan.View the currently logged on system user and logon time # fingerlogin Name Tty Idle Login hours Of
Article excerpt from:http://blog.csdn.net/lixiaohuiok111/article/details/34428161http://blog.csdn.net/lixiaohuiok111/article/details/34428161 first we give the OPT directory a write permission to sudo chmod a+w/opt then execute source/etc/ Profile and then exit the machine, when you re-enter the/opt/history below there will be a file generated by the admin.History And then we'll change the permissions back to write scripts to use Ansible batch deployment to other machines
#!/bin/bashsudo chm
that means.First install an Apache:sudo apt-get updatesudo apt-get install apache2Our script needs to be able to modify the /var/www/html content under the path (Web server root), so we need to add write permissions. We can set the current system user directly to the owner of the directory:sudo chown -R `whoami`:`id -gn` /var/www/htmlNext, go back to our project directory and create a index.html file:cd ~/projnano index.htmlWrite something inside:Sav
directory home to work.Throughout this book, we assume that/odoo–dev is the directory where your Odoo server is installed.First, make sure that you are logged in as a user that we create now or during the installation process, rather than as root user. Assuming your user is Odoo, use the following command to confirm:$ WhoAmI Odoo$ echo $HOME/home/odooNow we can use this script. It shows us how to install Odoo from the source code into the Debian/ubun
functionsSalt-run Jobs.list_jobs' Jobs.lookup_jid: 'Salt-run Jobs.lookup_jid 20130916125524463507Salt-run Jobs.lookup_jid 20130916125524463507 outputter=highstate' Jobs.print_job: 'Salt-run Jobs.print_job 20130916125524463507This shows salt-run all the commands about the job operation, and the explanation of each parameter can be viewed by salt-run-d jobs.Salt ' minion1 ' cmd.run ' sleep 100;whoami '^cexiting on Ctrl-cThis job ' s Jid is:201604191740
Overall frame diagram650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/5B/45/wKiom1UDxHHwQFHOAAEFNonb3io857.jpg "title=" Picture 1.png "alt=" Wkiom1udxhhwqfhoaaefnonb3io857.jpg "/>650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/5B/3F/wKioL1UDxafD2Ll9AACWNarE2vc043.jpg "title=" Picture 2.png "alt=" Wkiol1udxafd2ll9aacwnare2vc043.jpg "/>Leveraging MSFUse Auxiliary/scanner/portscan/tcpSome of the related ports can be swept.After discovery of port 1433, a brute force attempt was
; cron.none;local4.none @@192.168.2.2 # Modify the first bar, add Local4.none, and then cancel the LOCAL4 received message will be transferred to local4.* @@192.168.2.1
Modify the environment variables in the/ETC/BASHRC, this environment setting is inherited when the user logs on to the system
At the end, add the following informationexportprompt_command= ' { msg=$ (history1|{readabcd;echo $d; }); ip= $ (whoami|{readqwert;echo $t
%/devtmpfs 246M 0 246M 0%/dev/shmtmpfs 246M 308K 245M 1%/run/dev/sda1 9.1G 2.7G 5.9G 32%/tmpfs 246M 0 246M 0%/sys/fs/cgrouptmpfs 246M 308K 245M 1%/VAR/RUNTMPFS 246M 308K 245M 1%/var/locktmpfs 246M 0 246M 0%/medianone 80G 42G 39G 53%/media/sf_iso[Email protected]:~>Ll/mediaTotal 4drwxrwx---1 rootvboxsf4096 Mar 17 14:33Sf_isoThis directory belongs to the VBOXSF user group, so we use the following command to add ourselves to this user group:sudo/usr/sbin/usermod-a vboxsf '
Problem scenario: use ffmpeg to transcode the file. Problem Description: using php to call the terminal ffmpeg command through exec (), passthru (), system () to implement transcoding code: {code ...} running this php file on the terminal can be transcoded normally, but it can be passed... problem scenario: use ffmpeg to transcode the file.
Problem Description: use php to call the terminal ffmpeg command through exec (), passthru (), and system () to implement transcoding.
The code is as follows
The code for executing execPHP in Linux is 5.4PHP: lt ;? Phpexec (whoami, nbsp; $ r); var_dump ($ r); the root user uses php nbsp; test on the server terminal. the php output result is as follows, which is correct [[email #160; protected] nbsp; htdocs] # nbsp; php nbsp; test. PHP executes exec in Linux
PHP 5.4
The PHP code is as follows:
Exec ('whoam', $ r );Var_dump ($ r );
Root users use php test. php on the server terminal
The
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.